Business Data Networking
On host 10.0.0.254, how many ports were open? In the space provided, enter only the numeric value.
1
In a DNS database, which of the choices describes the record that holds the alternative names for a host?
CNAME
Which choice would NOT be recommended to install on a host running Hyper-V?
Virtual Box
The installation media used in the lab was installed as the _____.
Virtual SATA Optical disk
Which VMM was used in your lab tasks?
VirtualBox
Which choice requires installation of a virtual switch to access the internet?
Hyper-V
A network consists of seven computers and a network printer, all connected directly to one switch. Which network topology does this network use?
Star
You have a network of ten computers connected to a single switch that has 12 ports. You need to add six more computers to the network so you add a second switch by connecting it to the first switch by way of a network cable. Which network topology is now used?
Star-bus
You have been asked to set up a new data center. Before you proceed with the actual setup, you need to create a rack diagram of an existing rack that you want to use. Which of the following could be the reason for you to create one such diagram? [Choose all that apply].
To determine the quantity of servers you need to purchase To manage the size of the equipment to fit into the rack
Which of these is considered a secure place to store a list of documented network passwords?
a password manager
You are a network administrator and you need to access the secure command line interface access of an edge router on your network. The router uses cryptography for remote authentication. Which protocol is the router configured with for this purpose?
SSH
You've decided to run an Nmap scan on your network. What app could you open to perform this task? Choose all that apply.
Zenmap Command Prompt PowerShell
Which of the following is true about the OSPF routing protocol?
Each router has complete knowledge of the network topology
When your computer first joins an IPv6 network, what is the prefix of the IPv6 address the computer first configures for itself?
FE80::/10
Which type of DNS record identifies an email server?
MX record
Within which of the following OSI layers would a malfunction caused by a bad switch port reside?
Physical
Which part of a MAC address is unique to each manufacturer?
The OUI
Which choice is virtual hard disk file?
vhdx
A network consists of five computers, all running Windows 10 Professional. All the computers are connected to a switch, which is connected to a router, which is connected to the Internet. Which networking model does the network use?
Peer-to-peer
From the lab you know that the first six hexadecimal characters represent the OUI. Which choice is NOT the basis for the las six hexadecimal characters?
Addressing capabilities
What is the first step of inventory management?
List all components on the network
Which of the following IPv4 and IPv6 addresses are correctly portrayed using CIDR notation?
192.168.2.0/24 2001:db8::/32
In a DNS database, which of the choices describes the record that holds the name-to-address mapping for IPv4 addresses?
A
If you are connected to a network that uses DHCP, and you need to terminate your Windows workstation's DHCP lease, which command would you use?
ipconfig /release
You have configured a DHCP pool to allocate the IP addresses to the system for 3 days? What have you defined?
lease time
You are the host computer preparing for a Quick assist session. Which choice do you make to begin?
Get Assistance
Which type of address is used at the Transport layer to identify the receiving application?
Port
You are examining a network problem that many users are experiencing, and you decide to begin your investigation at the network layer of the OSI model. Which of the following troubleshooting approaches are you using?
Divide and conquer approach
A technician from your ISP has arrived to help you troubleshoot a weak WAN connection. To what location do you take her?
Entrance facility
DNS clients can use this zone to obtain information such as IP address that correspond to DNS domain names or services. What type of DNS zone is this?
Forward lookup zone
Which email protocol allows an email client to download email messages to the local computer?
POP3
You need to connect a new network printer to a nearby wall jack. What kind of cable should you use?
Patch cable
When interconnecting a switch port to a patch panel, which of the following information should be documented according to best practices? [Choose all that apply]
The port number of the switch used The network device on the other end of the link
You have just brought online a new secondary DNS server and notice your network-monitoring software reports a significant increase in network traffic. Which two hosts on your network are likely to be causing the increased traffic and why?
The secondary and primary DNS servers, because the secondary server is requesting zone transfers from the primary server
Which of the following are examples of Platform as a Service (PaaS)?
Apprenda
RADIUS provides AAA services. What does AAA stand for?
Authentication, Authorization, and Accounting
Which routing protocol does an exterior router use to collect data to build its routing tables?
BGP
Which choice best describes security flaws in software that allows unauthorized users to access a system?
Backdoor
Which transmission characteristic is never fully achieved?
Bandwidth
You have recently upgraded your network. Which method will help you to track its improvements to ensure accurate comparison of the performance?
Baseline review
Where does a MPLS label go in a PDU?
Between Layers 2 and 3
A hacker takes advantage of of an open Bluetooth connection to send a virus to a user's smartphone. What kind of security breach has occurred?
Bluejacking
Which protocol can be used to connect to and control Microsoft computers?
Both choices will work
When configuring a vNIC to access a physical network using the host machine's NIC, which choice is used?
Bridged mode
Which Carrier Sense technology is used on wireless networks to reduce collisions?
CSMA/CA
Which of these categories of twisted-pair cable can support Gigabit Ethernet?
Cat 5e, Cat 6a, Cat 7
What is the earliest twisted-pair cabling standard that meets the minimum requirements for 10GBase-T transmissions?
Cat 6a
A spoofed DNS record spreads to other DNS servers. What is this attack called?
DNS poisining
A DNS server is tricked into returning incorrect IP addresses for specific domain names
DNS poisoning
What specifications defines the standards for cable broadband?
DOCSIS
Which type of DoS attack orchestrates an attack using uninfected computers?
DRDoS (Distributed Reflection DoS) attack
You are asked to perform an analysis on the network that will allow you to deduce information from patterns in communication. Which of the following types of analysis are you asked to perform?
Data traffic analysis
Which of these attacks is a form of Wi-Fi DoS attack?
Deauthentication attack
A router receives a packet with a destination address that is not found within its routing table. The router is configured to send all such packets to a specific next hop address. What is this next hop address called?
Default route
What field in an IPv4 packet is altered to prioritize video streaming traffic over web surfing traffic?
DiffServ
The use of which of the following has decreased over the years because backplane bus speeds and centralized switch fabric capacities have increased?
Distributed Switching
What is the least number of bits you would need to borrow from the network portion of a Class B subnet mask to get at least 130 hosts per subnet?
Eight
Which two protocols manage neighbor discovery processes on IPv4 networks?
ICMP and ARP
Which command on an Arista switch would require an SNMP notification when too many devices try to connect to a port?
switchport port-security
Which of the following describes the configuring of MAC reservation in a DHCP server?
Manually allocate the MAC address to a desired IP address in the DHCP server
In which of the following applications can a virtual IP address be used?
NAT Gateway Redundancy Protocols
What manufacturer is listed for your sample MAC OUI?
Intel
What manufacturer is listed for your Ethernet MAC OUI?
Hewlett Packard
Which ports and services were filtered on your host?
None
Which choice is required for virtual machine manager to be installed on a system?
HAV
If you're shopping for a rack switch, what component on the switch tells you it can be mounted to a rack?
Rack ears
Which choice describes a DNS name resolution request that requires a resolution for answer?
Recursive
On your subnet, how many IPv4 addresses were scanned? In the space provided, enter only the numeric value.
10
The 6-digit security code expires after how many minutes?
10 minutes
On host 10.0.0.0.254, how many total ports were scanned? In the space provided, enter only the numeric value.
100
You want to display the cache entries for 192.168.1.101. Which parameter should you use with the arp command?
-a
All network devices have a MAC address. How many bits does this address require?
48
Which choice requires HAV on a 64-bit host?
64-bit operating system
On the Details tab for your host, what was the state of the host?
up
Which computers are the highest authorities in the Domain Name System hierarchy?
Root servers
How many CNAME records were shown when you initially executed the ipconfig /displaydns command?
1
Which of the following format can be considered a valid IPv6 addresses?
2001:0db8:0000:0003:0000:ff00:0042:8329
You need to connected to a colleague's system using the default Microsoft Windows remote desktop application to troubleshoot an application issue. Which port should be opened on the colleague's system firewall to ensure successful remote connection?
3389
Users on a network are complaining that they cannot to a Webserver by its name in the Web browser. You can access the Webserver using its IP address. You discover an access list is blocking several UDP ports. Which port should you remove from the access list to allow users to connect to the Webserver?
53
A computer is configured with a subnet mask of 255.255.255.192. How many IP addresses, including the network and broadcast addresses are available in the subnet the computer is in?
64
What manufacturer is listed for your Wi-Fi MAC OUI?
Liteon
Suppose you send data to the 11111111 11111111 11111111 IP address on an IPv4 network. To which device(s) are you transmitting?
All devices on your local network
You are on the client computer preparing for a Quick assist session. Which choice do you make to begin?
Give Assistance
In the client-server model, what is the primary protocol used for communication between a browser and web server?
HTTP
Which email protocol allows an email client to read mail stored on the mail server?
IMAP4
Which two encryption protocols might be used to provide secure transmissions for browser and web server communications?
SSL and TLS
You have been asked to host a new e-commerce Website. Your manager has asked you to configure the Website with a certificate. After hosting the Website with the certificate, which security protocol have you use?
SSL/TLS
What type of diagram shows a graphical representation of a network's wired infrastructure?
Wiring schematic
In a DNS database, which of the choices describes the record that holds the name-to-address mapping for IPv6 addresses?
AAAA
If you use the ping command to send an echo request from one host to the other, then which of the following protocols have you used?
ICMP
What was the file type of the installation file you used to install Ubuntu?
.iso
By default, which of the following components of the composite metric are considered for Enhanced Interior Gateway Routing Protocol (EIGRP) ?
Bandwidth and delay
You are planning to implement dual stack of IPv4 and IPv6 in your network. Currently your network consists of servers, routers, and switches that have not been upgraded for several years. You are still running Windows Server 2003. When implementing dual stack, which of the following will be your primary concerns?
Ensuring that the hardware and software support the implementation Keeping the hardware and software costs under control
A network engineer is configuring a network to be able to relay IPv6 packets. The network only supports IPv4 and does not have dual-stack support. Which of the following can be used to successfully relay IPv6 packets over this network?
IPv6 tunneling
Which of the following OSI layers is responsible for the segmentation, multiplexing, flow control and host-to-host communication services for application?
Transport layer
Which device converts signals from a campus's analog phone equipment into IP data that can travel over the Internet?
VoIP gateway
What decimal number corresponds to the binary number 11111111?
255
To get started with Quick Assist, you need to enter the 6-digit security code. Which is the correct code?
312862
You need to block all unsecured web traffic using its default port from a specific network segment of the enterprise network. Which port would you block to achieve this?
80
The network administrator has configured the enterprise firewall to permit port 21 to allow FTP transfers to occur from outside the enterprise. Users can connect to the FTP server that is located on the enterprise network. However, file transfers fails. Why could this be?
Port 20 along with port 21 must also be permitted
Which Ubuntu distribution was installed in the lab tasks?
Ubuntu Desktop
On host 10.0.0.254, how many closed ports were shown? In the space provided, enter only the numeric value.
99
You suspect that the Webserver, which is located on your network and hosts multiple Internet facing Websites. The Webserver runs on Windows Server 2008. After receiving complaints from the users of Webserver occasionally being unavailable, you investigate and find that it is getting flooded with many ping requests. What should you do to immediately handle this situation?
Block all incoming ICMP requests
You are informed that all the users within the network are unable to access the Internet. You decide to start troubleshooting from the Physical layer of the OSI model. Which of the following approaches would you use to troubleshoot this problem?
Bottom up approach
If you have a small Routing Information Protocol (RIP) network of 10 hops, how will RIP prevent routing loops?
By implementing a limit on the number of hops allowed in a path
What is the first thing you should check of you discover that domain names are not resolving into IP addresses on a PC or workstation?
Check connectivity to the default DNS server
You have a network that consists of seven computers running Windows 10 Professional. You add an eighth computer with Windows Server 2016 installed. Which networking model can the network now support that it could not support without the addition of the eighth computer?
Client-server
Which of the following OSI layers is involved with media access controls, hardware addressing and the local delivery of frames between devices on the same LAN?
Datalink layer
What type of device does a computer turn to first when attempting to make contact with a host with a known IP address on another network?
Default gateway
You manage a small stub network that has a router configured with static routing. If the connection to the next hop goes down, what action will the router perform?
It will continue to route traffic on the same path
You are asked to install a device that will combine several connections to the Internet and provide the sum of the available network while equally sharing the data traffic among all the Internet connections. Which of the following devices are you asked to install?
Load balancer
A transceiver was recently damaged by a lightning strike during the storm. How might you decide whether the ISP is responsible for replacing this device, or whether your company must foot the bill?
Look at whether the device is located on the ISP's side of the demarc.
You are the network administrator for a small organization of 100 users. Users till now were freely browsing the Internet. You want to put a provision in place where you can monitor their visits to the different Websites and block all unwanted Websites. Which of the following should you install and configure?
Proxy server
Your organization has multiple remote offices. The users at the remote office often remotely connect to the application servers. Which of the protocols should you enforce for encrypted communication? [Choose all that apply].
RDP SSH
You need to highlight the location of physical servers and network devices mounted on standardized frames that are installed within a datacenter to a new colleague. Which of the following types of diagrams should you show?
Rack diagram
Which application embedded in Windows operating systems allows remote control of a computer and uses the RDP secure protocol for transmissions?
Remote Desktop
Which of the following devices are you likely to find in the MDF? Choose all that apply.
Routers Switches KVM switch
You are a network administrator for an organization. You are asked to create a shared folder on a Microsoft Windows system so that other users on the same network are able to access its contents. To be able to meet this requirement, which protocol is likely to be used?
SMB
Refer to the following statements: This type of diagram depicts how devices are interconnected to each other using wires and cabling2) This type of diagram depicts the arrangement of devices and how they communicate with each other. Which diagram types are being described?
Statement 1 describes a physical network diagram while statement 2 describes a logical one
What method of IP network configuration would you use for devices such as servers and printers so that all users on a network will always be able to reach these resources using the same network address?
Static IP address allocation
Your network firewall currently allows only HTTP traffic to pass through. You need to allow FTP traffic to pass through the firewall. Which of the following should be allows? [Choose all that apply].
TCP port 20 TCP port 21
True or false? During a Quick Assist session, the technician providing assistance has the same rights and privileges as the user account that is being assisted (the host computer).
TRUE
Which of these commands is available only in Linux?
dig
What method does a GSM network use to separate data on a channel?
TDMA
A stateless firewall is faster than a stateful firewall.
TRUE
PAP, CHAP, and MS-CHAP are now considered legacy protocols.
TRUE
Telnet, SSH, and VNC are which type of software?
Terminal emulation
When shopping for a new router, what does the MTBF tell you?
How long devices like this one will last on average until the next failure
Why did the command prompt window open when you ran your task?
It is what you set to run
Active Directory and 389 Directory Server are both compatible with which directory access protocol?
LDAP
When configuring a vNIC to obtain IP addressing from its host, which choice is used?
NAT mode
What's the closest router location to Scoot Base's web server that your trace reached?
The Netherlands
Which NGFW feature allows a network admin to restrict traffic generated by a specific game?
Application awareness
What type of fiber cable problem is caused when parking a 50-micron core cable with a 62.5-micron core cable?
Fiber type mismatch
What is the Internet standard MTU?
1,500 bytes
What is the WAN Default Gateway?
10.0.0.1
What is the router's WAN IP Address?
10.0.0.136
What is the IP address of your primary interface? Enter you answer in the space provided.
10.0.2.15
When you traced the route to Oxford University, what was the longest delay on milliseconds? In the space provided, enter only the numeric value.
101
What 802.11 standards (mode) are used for the router's 5Ghz wireless band?
11ac only
What 802.11 standards (mode) are used for the router's 2.4Ghz wireless band?
11bgn mixed
In the space provided, enter the Upload speed reported by the online bandwidth tester. Enter only the numeric value.
12
What is the MTU value for your primary interface? Enter your answer in the space provided.
1500
What is the new IP address?
169.254.183.21
In the space provided, enter the Upload speed reported by the desktop app. Enter only the numeric value.
17.28
What is the IP address of your primary DNS server? Enter your answer in the space provided.
192.168.0.1
What is the router's LAN IP Address?
192.168.0.1
Your source data is of 50 GB. You make a full backup. Next week, once again you perform a full backup, but this time 10 more GB has been added to the source data. Second week, you perform another backup when the source backup has added 30 more GB. What is the total size of backups have you saved till date?
200 GB
How many channels are in an ISDN PRI connection?
23B+D
How many bits of a Class A IP address are used for host information?
24 bits
What is the netmask of your primary interface? Enter your answer in the space provided.
255.255.255.0
Which formulas can be used to calculate the magic number?
256 - the interesting octet 2^h
What is the formula for determining the number of possible hosts on a network?
2^h -2 = Z
You need to implement high availability in your network. One implementation company ensures that their implementation will provide 99% of availability in a period of one year. With the mentioned availability, what would be the total downtime in a year?
3.65 days
On what date did your DHCP error occur? Enter answer in MM/DD/YYYY.
3/16/2018
In the space provided, enter the Download speed reported by the desktop app. Enter only the numeric value.
300.84
In the space provided, enter the Download speed reported by the online bandwidth tester. Enter only the numeric value.
306
When you traced the route to University, what was the IP address of the first London router responded?
62.115.135.95
Which 802.11 standard functions in both the 2.4-GHz and 5-GHz bands?
802.11n
Which IEEE standard determines how VLANs work on a network?
802.1Q
A routing protocol's reliability and priority are rated by what measurement?
AD
What feature of Windows Server allows for agentless authentication?
AD (Active Directory)
Your computer has autoconfigured another IP address. What type of address did your computer resort to?
APIPA
Which of the following is not one of the three AAA services provided by RADIUS and TACACS+?
Access Control
When configuring the User accounts, which should be changed as a first step?
Administrator
What software might be installed on a device to authenticate it to the network?
Agent
The software you used in this lab can be compared to which of the tools listed?
All of these
Which of these choices is a feature of an NGFW?
All of these
The practice of releasing system patches on a set schedules provides hackers with which of the choices?
All of these are correct
Which of the event types are NOT displayed in Event Viewer?
All of these are displayed
You are configuring two switches of different vendors such that they connect to each other via single link that will carry multiple VLANs. What kind of trunk link must you configure for the two devices to successfully function in this manner?
An IEEE 802.1q trunk
If you need to perform port scanning in your network, which of the following tool are you likely to use?
Angry IP Scanner Superscan
You take a full backup of the source data on Monday. Rest of the week, you take differential backups. What would the differential backup of Friday contain?
Changes since the full backup
When a switch receives data on one of its ports, what is the next step does it perform?
Checks the MAC table for the destination system
What field in a TCP segment is used to determine if an arriving data unit exactly matches the data unit sent by the source?
Checksum
What kind of network is the PSTN?
Circuit-switched
Which Bluetooth class has the highest power output?
Class 1
A virtual host containing 5 virtual servers represents a single point of failure. How can virtual services like email, file, web and database servers be best managed?
Clustering and Automatic Failover
What kind of cable uses BNC connectors? Which connector is likely to be used by cable TV?
Coaxial cable, F-connector
Which type of disaster recovery site contains all the equipment you would need to get up and running again after a disaster, and yet would require several weeks to implement?
Cold site
Employees are complaining that the network seems to be slow. How could you quantitatively determine if this is the case?
Compare network performance to baselines
Which of the following are examples of Software As A Service (SaaS) cloud model?
Concur Salesforce Google Apps
Your network comprises of multiple switches and a single router. Currently, all users of finance and marketing on the third floor are connected to a flat switch. You must segregate traffic between your finance and marketing groups. You need to ensure that critical finance information can flow without delay to the finance users and ensure additional level of security. What should you do?
Configure VLANs on the switch
What kind of firewall blocks traffic based on application data contained within the packets?
Content-filtering firewall
While designing your network's VLAN topology, your team has decided to use a centrally managed DHCP server rather than creating a separate DHCP server to each VLAN. What software will you need to make the central DHCP server accessible across VLANs?
DHCP relay agent
What was the source of your DHCP error?
DHCP-client
What kind of information would you expect to find within a network device's event log?
Event Descriptions Time of events
You just settled in for some study time at the local coffee shop, and you pause long enough to connect your smartphone to the Wi-Fi so you can listen to some music while you study. As you're about to sign in, you that you clicked on an SSID called "Free Coffee and Internet." What kind of security trap did you almost fall for?
Evil twin
Which choice best describes the practice of taking advantage of weakness?
Exploit
What technology does Bluetooth use to take advantage of the 79 channels allocated to the Bluetooth band?
FHSS
You need to design a backup strategy. You need to ensure that all servers are backed up every Friday night and a complete copy of all data is available with a single set of media. However, it should take minimal time to restore data. Which of the following would be the ____?
Full
When a router can't determine a path to a message's destination, where does it send the message?
Gateway of last resort
File integrity monitoring (FM) is generally performed on which device?
HIDS
The activities you performed in this lab are all examples of this type of security.
Hardening
When configuring a vNIC, which choice is used to allow VMs on the same host to communicate but NOT with other network nodes?
Host-Only mode
Which of the following is the correct use case for a public cloud?
Hosting of latency intolerant Web tiers Need for auto-scaling environment to host large Web application
When examining tunneling protocols, which choice is a component of the IPsec protocol suite?
IKEv2
When you traced the route to the Scott Base research website, which choice was NOT a possible reason for your packets to be dropped?
IP configuration
When you traced the route to the University of Lisbon in Portugal, which internet protocol was used?
IPv6
Telnet, SSH, RDP, and VNC all rely on which type of management?
In-band
When restoring a backup, which of them is likely to be most time consuming to restore?
Incremental
Which one of the following wireless transmission types requires a clear LOS to function?
Infrared
A former employee discovers six months after he starts work at a new company that his account credentials still give him access to his old company's servers. He demonstrates his access to several friends to brag about his cleverness and talk badly about the company. What kind of attack is this?
Insider threat
After manually changing your IP address your computer identified the duplicate IP address problem. How can you tell?
It displays a duplicate address warning
How can you tell this is an APIPA address?
It is in the 169.254.0.1 through 169.254.255.254 range
In the lower pan of the Task Scheduler under Security options, which user account will be used to run your task?
LabConnection
What is the router's SSID for the 2.4Ghz wireless band?
LabConnection 2.4n
What is the router's SSID for the 5Ghz wireless band?
LabConnection 5.0ac
What is the lowest layer of the OSI model at which LANs and WANs support the same protocols?
Layer 3
What is the lowest layer of the OSI model at which wired and wireless transmission share the same protocols?
Layer 3
At what layer of the OSI model do proxy servers operate?
Layer 7
What is another term used for Next Generation Firewalls?
Layer 7 firewall
Which of the following types of authentication and access control does not need an external AAA server to verify credentials inputted by users?
Local authentication
Which of the following types of authentication will continue to function even if network connectivity to any available AAA servers is lost?
Local authentication
Leading up to the year 2000, many people expected computer systems the world over to fail when clocks turned the date to January 1, 2000. What type of threat was this?
Logic bomb
You have added a new device to the network management application. What else should you add to the network management application to be able to control it?
MIB
Which fiber connector contains two strands of fiber in each ferrule?
MTRJ
Which of the following is an example of public cloud?
Microsoft Azure Amazon Web Services IBM Bluemix
What is the most common cause of firewall failure?
Misconfiguration
A company wants to have its employees sign a document that details some project-related information that should not be discussed outside the project's team members. What type of document should they use?
NDA
Which kind of crosstalk occurs between wire pairs near the source of the signal?
NEXT
A user swipes her smartphone across a tag on a poster to obtain showtimes for a movie she wants to see later that evening. What wireless technology transmitted the data?
NFC
Merging physical and virtual network architecture is known by what acronym?
NFV
Which choice is best suited to operate in a network DMZ?
NIDS
What do well-chosen subnets accomplish?
Network documentation is easier to manage
At which OSI layer does IP operate?
Network layer
What OSI layer is responsible for directing data from one LAN to another?
Network layer
A network administrator is implementing a ping from one end of the network to the other, records the average round-trip time and archives the results. What is most likely being prepared?
Network performance baseline
______ in SONET are analogous to the _____ of T-carriers.
OC levels, digital signal levels
To reduce any kind of network congestion bottleneck, you have configured client-side caching. Which of the following is likely to use this configuration?
Offline folders
Which power backup method will continually provide power to a server if the power goes out during a thunderstorm?
Online UPS
Using port 110, you have configured an E-mail client to retrieve E-mails from a remote server over a TCP/IP connection. Which protocol is the E-mail client configured with?
POP
You have recently shared a document with the user that mentions the need and set of rules for creating credentials of appropriate complexity. Which document is this?
Password policy
What kind of attack simulation detects vulnerabilities and attempts to exploit them?
Penetration testing
A company accidentally sends a newsletter with a mistyped website address. The address points to a website that has been spoofed by hackers to collect information from people who make the same typo. What kind of attack is this?
Phishing
Your colleague received an E-mail from a bank that is requesting credit card and PIN information. Which of the following types of attacks is this?
Phishing
What port do SNMP agents listen on?
Port 161
Your organization has just approved a special budget for a network security upgrade. What procedure should you conduct to make recommendations for the upgrade priorities?
Posture assessment
Which of the following can be prevented if DHCP snooping is implemented on a switch?
Preventing the malformed DHCP traffic Preventing the rogue DHCP servers
Which of the following is a document that must be signed by individuals seeking controlled access to restricted network resources?
Privileged user agreement
Which of the following networking protocols provide a centralized authentication, authorization, and accounting management system for users that connect and use network services?
RADIUS
A password policy as part of a network user agreement may require users to do which of the following?
Require a minimum number of characters Require at leas one of different kinds of characters (numbers, capital letters)
Geofencing is an effective way to accomplish which of the following?
Restrict access areas
You've just completed a survey of the wireless signals traversing the airspace in your employer's vicinity, and you've found an unauthorized AP with a very strong signal near the middle of the 100-acre campus. What kind of threat do you need to report to your boss?
Rogue AP
When implementing secure remote file access which choices will be incompatible with each other? Select all that apply.
SFTP FTPS
An E-mail client application uses port 25 to connect to the outgoing E-mail server. Which protocol is being used in this scenario?
SMTP
You have recently installed a new firewall on a network. After the firewall is installed, you review the firewall logs and notice that the port 25 incoming traffic is blocked. Which of the following protocol is impacted with this?
SMTP
You are asked to monitor a network which has a network monitoring system. Using the monitoring server, you notice that it is listening on port number 161 for network events. Which network monitoring protocol is in use?
SNMP
You want to monitor the routers for their performance. In case of a performance bottleneck, you need to be alarmed. Which of the following protocol should you use?
SNMP
What command requests the next record in an SNMP log?
SNMP Get Next
Which of the following is considered a secure protocol?
SSH
Which kind of multiplexing assigns slots to nodes according to priority and need?
STDM (statistical line division multiplexing)
Which of the following cloud model is like thin-client model of software provisioning?
SaaS
You configured the computer to display a logon screen on resume. Which choice would NOT be required in the current configuration on resume?
Smart card
What kind of device can monitor a connection at the demarc but cannot interpret data?
Smart jack
Which of the following features of a network connection between a switch and server is not improved by link aggregation?
Speed
A network resource is masquerading as a network server and is causing hosts on the network to send requests to the attacker rather than the legitimate network server. What kind of attack is this?
Spoofing
Which type of firewall monitors each packet according to currently existing data streams?
Stateful
Which of the following is true about Load balancing on a network? 1) Provides redundancy 2) Provides an increase in throughput 3) Increases CPU resources
Statements 1 and 2 are true
Which of the following statements is true about Fault tolerance? 1) It is a direct result of the design of the network itself. 2) It is name of the feature that allows for dual layer 2 connections between switches 3) Enables a network to continue functioning normally in case of partial failure.
Statements 1 and 3 are true
A VPN concentrator will: 1) allow only one VPN connection to be established at any one time 2) allow multiple VPN connections to be established simultaneously 3) provides remote clients with secure connectivity to the internal network resources of the network. Which of the above statements is true?
Statements 2 and 3
What kind of route is created when a network administrator configures a router to use a specific path between nodes?
Static route
Which of the following IP network configuration elements a DHCP server, running on Windows Server 2012, can provide to a Windows 10 system?
Subnet mask IPv4 address
You are required to implement an AAA solution for several services found within the corporate network. Which of the following protocols would you use?
TACACS+
Which protocol's header would a Layer 4 device read and process?
TCP
Which of the following are characteristics of the MTU when applied to IP and Ethernet networks?
The default MTU is 1500 bytes The MTU is the largest size an encapsulated segment can have
If users in your organizations use laptops and mobile to access online E-mail accounts. You are using IMAP as the protocol. What will happen if a user, using both mobile and a laptop, deletes one E-mail using either of the device?
The deletion of the E-mail will occur on both the devices
Identify the correct statement for a switch's MAC Address Table. It is possible to have more than one MAC address corresponding to a single port. It is possible to have more than one port corresponding to a single MAC address.
The first is true, the second is false
Which hexadecimal block in an IPv6 address is used for the Subnet ID?
The fourth one
Your organization's network has multiple layers of security devices. When you attempt to connect to a service on the Internet. However, you receive a security message from the operating system stating that this service is blocked on your workstation. What could be the probable cause?
The host-based firewall settings are blocking the service.
Why would an attacker perform a brute force attack?
To gain access to a password protected system
Which of the following is not a good reason to segment a network?
To increase the number of networking devices on a network
Why would a network administrator implement vulnerability scanning on a network?
To reveal vulnerabilities in the network
Which part of a toner and probe kit emits an audible tone when it detects electrical activity on a wire pair?
Tone locator
One of your coworkers downloaded several, very large video files for a special project she's working on for a new client. When you run your network monitor later this afternoon, what list will your coworker's computer likely show up on?
Top listeners
You have been experiencing connectivity with various websites. The response time open these websites is high You tested the same websites from your home and could open them much faster. You assume that the slow access to the Websites might be due to high latency. Which of the given utility is likely to help you in finding the source that may be causing the latency issue?
Traceroute
Your roommate has been hogging the bandwidth on your router lately. What feature should you configure on the router to limit the amount of bandwidth his computer can utilize at any one time?
Traffic shaping
Which of the following protocols is a centralized Authentication, Authorization, and Accounting protocol?
UTM appliance
Which Linux distribution did you install your lab tasks?
Ubuntu
You have been using a wireless router at home. You get an E-mail from the manufacturer that the same router now has been provided with new functionality in its admin interface. You want to get this functionality on the same router without losing existing configuration. What should you do with minimum administrative effort?
Upgrade the firmware on the wireless router
To establish secure sign-in during the lab, you set the CTRL+ALT+DEL logon requirement. Which system applet did you use to enable it?
User Accounts
Which of the following features is common to both an NGFW and traditional firewalls?
User authentication
Which DSL standard has the fastest speeds immediately outside the CO?
VDSL
While examining frames on the network using a packet analyzer, you observe several frames that are double tagged. What kind of attack could a host on the network be performing that may result in this?
VLAN hopping
Your colleague has configured a trunk between two switches. You notice that the configuration on each end is inconsistent. On one of the switch, your colleague has configured VLAN 10 and on the second switch, no VLAN is configured. With this configuration, which problem are you likely to face?
VLAN mismatch
Which of the following devices can be installed on the edge of your network to allow multiple remote users to connect securely to your internal enterprise network?
VPN concentrator
Which of the following ACL commands would permit web-browsing traffic from any IP address to any IP address?
access-list acl_2 permit http any any
You have created a virtual machine. For the virtual machine to communicated with the physical network, what should you configure in the virtual machine?
Virtual NIC
You need to configure multiple virtual machines (VMs) to connect to a network. To be able to achieve this, which of the following should you configure?
Virtual Switch
Which choice best describes a weakness in a system or process?
Vulnerability
While troubleshooting a recurring problem on your network, you will want to examine the TCP messages being exchanged between a server and a client. Which tool should you use?
Wireshark
When examining the User accounts, did any have unusual assignments?
Yes, User
While troubleshooting an E-mail client issue on a user's system, you that the incoming mail server settings are configured to listen on port 143. How will the client be able to use port 143? [Choose all that apply]
You can use multiple devices to access E-mails Incoming E-mails will be stored on the server
When connecting a trunk link between two switches, it is important to configure the allowed VLANs correctly on either end. If this is not done correctly, which of the following can occur?
a VLAN mismatch
An organization can lease a private _____ that is not shared with other users, or a ______ that can be physically configured over shared lines in the carrier's cloud.
dedicated line, virtual circuit
You would like to determine the domain name of a specific IP address that exists on the Internet without using a web browser. Which of the following tools could you use for this?
dig
What is the name of your primary interface? Enter your answer in the space provided.
enp0s3
Software enables computers to perform the functions of a packet filtering firewall. Which choice is a command utility?
iptables
You have configured a VPN between your gateway router and another gateway router of the partner organization. You need to ensure that the communication between both the router is encrypted using IPSec. Which type of IPSec configuration are you doing?
network-to-network
To troubleshoot a network problem, you are required to use a packet analyzer on a Unix based system. Which of the following command line interface commands will provide you with the required functionality?
tcpdump
Which port mode on a switch enables that the port to manage traffic for multiple VLANs?
trunk
Suppose you're creating patch cables to be used in a government office. What color wire goes in the first pin?
white/green